Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
First embodiment
As shown in Figure 1, the terminal interface display methods of first embodiment of the invention, is applied to mobile terminal, including:
Step 101, the peep-proof instruction of triggering is determined.
In this step, need to carry out mobile terminal payment in public places for such as user, when needing to prevent Password Input
The case where being known by other people will be instructed, and then understand after triggering peep-proof instruction by the peep-proof for starting peep-proof pattern
To the demand of user, to carry out subsequent processing.
Step 102, it is instructed according to the peep-proof, starts peep-proof pattern, and obtained correspondence first in the peep-proof pattern and answer
With the target peep-proof display parameters with the second application;Wherein, first application is foreground application, and second application is backstage
The last application being activated in, the target peep-proof display parameters are used for characterizing first application and described second
Display parameters after the interface overlapping of application.
In this step, is instructed according to the peep-proof that step 101 determines, i.e., can start peep-proof pattern, and obtain the peep-proof mould
It is shown in formula for adjusting the target peep-proof of the interface display of the last application being activated in foreground application and background application
Parameter, the interface display to carry out peep-proof are arranged.Wherein, foreground application i.e. first is applied, and application interface is currently displaying;
The last application i.e. the second application being activated, is the application being activated in background application, but second application is currently
Be not activated state, and application interface is not also shown currently.Obtaining the boundary for characterizing the first application and the second application
After display parameters after the overlapping of face, you can execute next step.
Step 103, according to the target peep-proof display parameters, the display of adjustment first application and second application
Interface.
In this step, starting peep-proof pattern through step 102, and it is anti-to get pre-set target in the peep-proof pattern
After peeping display parameters, the display interface of the first application and the second application is just adjusted according to the target peep-proof display parameters, so that
It is finally shown as the effect of the blurring of peep-proof pattern setting, achievees the purpose that peep-proof.
In this way, through above-mentioned steps 101- steps 103, by determining that the peep-proof of triggering instructs, it is thus understood that after user needs,
It will be based on peep-proof instruction and start peep-proof pattern, and obtain the target of corresponding first application and the second application in the peep-proof pattern
Peep-proof display parameters, and then the tune for the display interface for completing to apply the first application and second according to the target peep-proof display parameters
It is whole.First application is foreground application, and the second application is the last application being activated in background application, and the target peep-proof is aobvious
Show that parameter is therefore to use the mesh for characterizing the display parameters after the interface of first application and second application is overlapped
After marking the adjustment that peep-proof display parameters carry out display interface, interface that mobile terminal screen show is based on the first application interface and the
The overlapping of two application interfaces will present the effect of blurring, to ensure the safety of individual privacy, and without sticking on peep-proof
Film avoids the problem of mobile terminal electric quantity consumption accelerates.
Such as need to carry out the scene of mobile terminal payment, user to enter password after starting Mobile banking in public places
Input interface does not remove input password, but (Mobile banking enters running background shape to deactivation another application such as browser
State), and trigger peep-proof instruction.In this way, applying the mobile terminal of first embodiment of the invention, the anti-of user's triggering is being determined
It can start peep-proof pattern after peeping instruction, and obtain and correspond to browser (first apply) and Mobile banking (the in the peep-proof pattern
Two application) target peep-proof display parameters, in this way, be based on the target peep-proof display parameters, complete browser interface and mobile phone silver
The blurring of row interface for password input shows that other staff can not both see the particular content that mobile terminal screen is shown clearly, for
The subsequent input password of user can not also recognize its specific purposes, protect the privacy of user.
In this scenario, browser interface be in order to protect Mobile banking interface, therefore, after starting peep-proof pattern,
According to the target peep-proof display parameters of acquisition, when adjusting display interface of the browser with the Mobile banking, to reach more preferably
Effect optionally first the interface size based on the Mobile banking in running background, adaptation can adjust the current interface of browser
Size, display interface that is two interfaces are completely overlapped, and then being adjusted by the target peep-proof display parameters, reaches after overlapping
To scheduled blurring effect, the purpose of peep-proof is realized.
Certainly, the size of the second application interface is specifically adjusted based on the size of the first application interface, or with
The size of the first application interface is adjusted based on the size of second application interface, can be based on itself in peep-proof pattern by user
Operating habit pre-sets content to determine, is not limited to above-mentioned realization method.
In conclusion the method for first embodiment of the invention will apply family after determining the peep-proof instruction of user's triggering
Demand starts peep-proof pattern, corresponds to what the last time in foreground application and background application was activated in the peep-proof pattern by obtaining
Using the target peep-proof display parameters of two applications, to adjust the interface display of the two applications, join since the target peep-proof is shown
Therefore number is the display parameters after characterizing the interface overlapping that the two are applied can realize that mobile terminal screen is shown after the adjustment
The blurring effect at interface has carried out peep-proof protection to the individual privacy of user, just without sticking on peep-proof film in screen, and then keeps away
The acceleration consumption of electricity is exempted from.
Second embodiment
As shown in Fig. 2, the terminal interface display methods of second embodiment of the invention, is applied to mobile terminal, including:
Step 201, the peep-proof instruction of triggering is determined.
In this step, need to carry out mobile terminal payment in public places for such as user, when needing to prevent Password Input
The case where being known by other people will be instructed, and then understand after triggering peep-proof instruction by the peep-proof for starting peep-proof pattern
To the demand of user, to carry out subsequent processing.
Step 202, it is instructed according to the peep-proof, starts peep-proof pattern, and obtained correspondence first in the peep-proof pattern and answer
With the target peep-proof display parameters with the second application;Wherein, first application is foreground application, and second application is backstage
The last application being activated in, the target peep-proof display parameters are used for characterizing first application and described second
Display parameters after the interface overlapping of application.
In this step, is instructed according to the peep-proof that step 201 determines, i.e., can start peep-proof pattern, and obtain the peep-proof mould
It is shown in formula for adjusting the target peep-proof of the interface display of the last application being activated in foreground application and background application
Parameter, the interface display to carry out peep-proof are arranged.Wherein, foreground application i.e. first is applied, and application interface is currently displaying;
The last application i.e. the second application being activated, is the application being activated in background application, but second application is currently
Be not activated state, and application interface is not also shown currently.Obtaining the boundary for characterizing the first application and the second application
After display parameters after the overlapping of face, you can execute next step.
Step 203, according to the target peep-proof display parameters, the display of adjustment first application and second application
Interface.
In this step, starting peep-proof pattern through step 202, and it is anti-to get pre-set target in the peep-proof pattern
After peeping display parameters, the display interface of the first application and the second application is just adjusted according to the target peep-proof display parameters, so that
It is finally shown as the effect of the blurring of peep-proof pattern setting, achievees the purpose that peep-proof.
But after through step 203, the current display interface of mobile terminal has been in blurring, so being used to realize
Further operating is continued at family, executes step 204.
Step 204, it obtains and corresponds to first application and second application in the pre-set peep-proof pattern
Input range.
In this step, the input model of corresponding first application and the second application in the pre-set peep-proof pattern is obtained first
It encloses, to carry out using the division and association with its corresponding region.Wherein, which can will be touched for two applications
Touch screen be divided into up and down left and right or other specific two parts regions allocation of parameters, by user the peep-proof pattern setting
It is set in.
Step 205, according to the input range, the touch screen of the mobile terminal is divided into and first application
Corresponding first area and with it is described second apply corresponding second area.
In this step, according to the input range that above-mentioned steps 204 obtain, screen will be touched and divided, two are obtained and answer
With corresponding region.In this way, by the region corresponding to user's operation, mobile terminal although it is understood that user institute is to be used
Using the specially first application or the second application.
Step 206, the touch operation touched on screen, and the target area occurred according to the touch operation are detected
Domain determines intended application corresponding with the target area, and the target area includes first area and second area.
In this step, after the region division that step 205 completes touch screen, it will start and touch behaviour on screen to touching
The detection of work, to, after detecting a touch operation, it will be able to according to the touch operation occur target area, determine with
The corresponding intended application in the target area.
Step 207, it generates corresponding input according to the touch operation to instruct, and described in the input instructed being sent to
Intended application is handled.
In this step, based on the intended application that step 206 determines, corresponding input is generated according to the touch operation and is instructed,
And input instruction is sent to intended application and is handled.Wherein, which, then can be directly in response to if the first application
Input instruction is handled;And if the second application, then advanced line activating is needed, is then responded again at input instruction
Reason.
In this way, 201- steps 207 through the above steps, mobile terminal is needing to start peep-proof pattern according to user, by preventing
The target peep-proof display parameters adjustment mobile terminal peeped in pattern corresponds to the display interface of the first application and the second application, and realization is set
Fixed blurring effect has carried out peep-proof protection to the individual privacy of user, avoid screen stick on peep-proof film accelerate electricity disappear
The generation of consumption.And later, it can will also be touched by the input range of corresponding first application and the second application in the peep-proof pattern that pre-sets
It touches screen and carries out corresponding division, and then the target area occurred according to user's touch operation, determine corresponding intended application, with
The corresponding input generated according to the touch operation instruction is sent to intended application to handle, reaches the final of user's operation
Purpose.In this way, because user by presetting is the application known corresponding to the target area of its touch operation, so being not necessarily to
The operation of application can either be continued by exiting the peep-proof pattern, further improved peep-proof effect, also improved system just
Victory.
Wherein, step 201 includes:
It is preset to occur in preset peep-proof mode startup operation or present displayed content to detect the operation of user
When peep-proof pattern starts word, triggering peep-proof instruction.
Here, user or system can preset peep-proof mode startup operation and/or peep-proof pattern starts word, to move
Dynamic terminal the operation detected will be compared with preset peep-proof mode startup operation, or in present displayed content
In detect whether there are peep-proof pattern start word, come carry out peep-proof instruction triggering judge, peep-proof is triggered after successful match
Instruction, it is automatic to start peep-proof pattern, to improve the intelligence of mobile terminal.The peep-proof mode startup operation is concretely one specific
The slide of track such as " U " or " O ", peep-proof pattern starts word, and to be that " readings ", " picture ", " exchange software " etc. are related to hidden
Private keyword.Certainly, the triggering of peep-proof instruction is not limited to above two mode, (can also such as be said " anti-by voice
Peep "), the triggerings such as virtual key (setting peep-proof start button) or physical button, will not enumerate herein.
In addition, specifically, in this embodiment, the target peep-proof display parameters include:The transparency of interface display;Its
In, the transparency of the interface display includes target clear degree and second application interface that first application interface is shown
The target clear degree of display.
Here, the transparency for the interface display which includes, has specifically included the first application interface
The target clear degree that the target clear degree and the second application interface of display are shown.Preferably, to adapt to the total saturating of interface display
Lightness limit value can carry out average value setting, and when such as limit value 1, the target clear degree of the first application is 0.5, second in the transparency
The target clear degree of application is also 0.5, after peep-proof pattern starts, according to the two target clear degree respectively to the boundary of the first application
Face and the interface of the second application carry out display setting, and mobile terminal will finally show the vague interface after two interfaces superpositions.When
So, which is not limited to transparency this parameter, further includes the parameters such as brightness, aberration, colour temperature, differs herein
One enumerates.
It should be appreciated that in this embodiment, the concrete numerical value of each parameter of the final display interface of peep-proof pattern is not only
It is limited to the predetermined distribution of system, to ensure that interface display adapts to the requirement of user, further, in step 202, obtains institute
Stating the step of correspondence first in peep-proof pattern applies the target peep-proof display parameters with the second application includes:
It applies, the number of starts in the application attribute and preset time of second application, determines according to described first
The peep-proof priority of first application and second application;
According to the peep-proof priority, by the application of peep-proof highest priority in first application and second application
Peep-proof display parameters as target peep-proof display parameters.
It is found that in the embodiment, user is capable of the peep-proof display parameters of self-defined application, so starting peep-proof pattern
When, target peep-proof display parameters at this time are first determined, specifically, mobile terminal can be according to the application attribute of two applications and pre-
If the number of starts in the period determines its corresponding peep-proof priority, as the peep-proof priority of Bank application is higher than immediately
The peep-proof priority of communications applications, but when application attribute is identical, also need to combine the number of starts in preset time, to
The use habit of user can be preferably corresponded to, later, according to the peep-proof priority of application, with highest peep-proof priority application
Peep-proof display parameters are target peep-proof display parameters.
If user sets the transparency of Mobile banking as 0.4, the transparency of wechat is 0.8, and under peep-proof pattern, two thoroughly
The total value of lightness is more than 1, has exceeded total transparency limit value of interface display, so, according to the method described above, it is based on Mobile banking
Peep-proof priority be higher than wechat, final it is confirmed that the transparency of Mobile banking is 0.4, the transparency 1-0.4=of wechat
0.6, rather than 0.8.Which can also be used to determine the correspondence parameter of final display interface in other types parameter.
It is appreciated that in the above content, end interface is carried out after blurring shows, pre-set peep-proof can be based on
Input range is divided to touching screen in pattern, and determines that user's input is corresponding by touch operation of the user on touching screen
Intended application.Wherein, for different types of touch operation, in the method for the embodiment of the present invention, in step 206, according to described
Touch operation occur target area, determine intended application corresponding with the target area the step of include:
If the touch operation is clicking operation, the target area that the clicking operation occurs is obtained, is determined and the mesh
Mark the corresponding intended application in region;
If the touch operation is slide, the target area where the starting point of the slide is obtained, is determined
Intended application corresponding with the target area.
In this way, detect clicking operation of the user to touch screen, the target that can be occurred by understanding the clicking operation
Region, to using the application corresponding to the target area as intended application.And since slide trans-regional may occur,
Therefore user can be based on and slide custom, the target area where the starting point of the slide is preferably obtained, with the target area institute
Corresponding application is as intended application.Can naturally also it be arranged using the region where the end point of slide as target area
Domain.
Such as need to carry out the scene of mobile terminal payment, user to enter password after starting Mobile banking in public places
Input interface does not remove input password, but (Mobile banking enters running background shape to deactivation another application such as browser
State), and trigger peep-proof instruction.In this way, applying the mobile terminal of second embodiment of the invention, the anti-of user's triggering is being determined
It can start peep-proof pattern after peeping instruction, and obtain and correspond to browser (first apply) and Mobile banking (the in the peep-proof pattern
Two application) target peep-proof display parameters, later will be based on the target peep-proof display parameters, complete browser interface and mobile phone silver
The blurring of row interface for password input is shown.Then, can also screen will be touched by the input range in the peep-proof pattern that pre-sets
Two different zones of corresponding Mobile banking and browser are divided into, finally, after user clicks Mobile banking corresponding region, root
Corresponding input instruction is generated according to clicking operation and is sent to Mobile banking, and Activate Phone bank, and regard input number as password
It is handled, reaches the final purpose of user's operation.
In this scenario, browser interface be for protecting Mobile banking interface, therefore, after starting peep-proof pattern,
According to the target peep-proof display parameters of acquisition, when adjusting interface display of the browser with the Mobile banking, to reach more preferably
Effect optionally first the interface size based on the Mobile banking in running background, adaptation can adjust the current interface of browser
Size, two interfaces are completely overlapped, and then joined to adjust the display after the overlapping of interface by the target peep-proof display parameters
Number, reaches scheduled blurring effect, realizes the purpose of peep-proof.
Certainly, the size of the second application interface is specifically adjusted based on the size of the first application interface, or with
The size of the first application interface is adjusted based on the size of second application interface, can be based on itself in peep-proof pattern by user
Operating habit pre-sets content to determine, is not limited to above-mentioned realization method.
In conclusion the method for second embodiment of the invention answers user demand to start anti-in the peep-proof instruction for determining triggering
After peeping pattern, the last application being activated in foreground application and background application can be corresponded in the peep-proof pattern by obtaining
Target peep-proof display parameters realize the blurring of mobile terminal screen display interface to adjust the interface display of the two applications
Effect, other staff can not both see the particular content that mobile terminal screen is shown clearly, also can not for the subsequent input of user
Its specific purposes is solved, protects the privacy of user, and because user by presetting is the target for knowing its touch operation
Application corresponding to region, so the operation of application can either be continued without exiting the peep-proof pattern, further promoted
Peep-proof effect, also improves the convenience of system.Without sticking on peep-proof film in screen, and then the acceleration for avoiding electricity disappears
Consumption.
3rd embodiment
Fig. 3 is the block diagram of the mobile terminal of one embodiment of the invention.Mobile terminal 300 shown in Fig. 3 includes determining mould
Block 301, first processing module 302 and adjustment module 303.
Determining module 301, the peep-proof instruction for determining triggering;
First processing module 302 starts peep-proof pattern, and obtain the peep-proof pattern for being instructed according to the peep-proof
The target peep-proof display parameters of the application of middle correspondence first and the second application;Wherein, first application is foreground application, described the
Two applications are the last application being activated in background application, and the target peep-proof display parameters, which are used for characterizing described first, answers
With the display parameters after the interface overlapping with second application;
Module 303 is adjusted, for according to the target peep-proof display parameters, adjustment first application and described second to be answered
Display interface.
On the basis of Fig. 3, optionally, as shown in figure 4, the mobile terminal 300 further includes:
Acquisition module 304 corresponds to first application and described for obtaining in the pre-set peep-proof pattern
The input range of two applications;
Division module 305, for according to the input range, by the touch screen of the mobile terminal be divided into it is corresponding
Described first applies corresponding second area using corresponding first area and with described second;
Second processing module 306 for detecting the touch operation on the touch screen, and is sent out according to the touch operation
Raw target area determines intended application corresponding with the target area, and the target area includes first area and second
Region;
Third processing module 307 is instructed for generating corresponding input according to the touch operation, and the input is referred to
Order is sent to the intended application and is handled.
Optionally, the Second processing module 306 includes:
First processing submodule 3061 obtains the clicking operation and occurs if being clicking operation for the touch operation
Target area, determine corresponding with target area intended application;
Second processing submodule 3062 obtains rising for the slide if being slide for the touch operation
Target area where initial point determines intended application corresponding with the target area.
On the basis of Fig. 3, optionally, as shown in figure 5, the first processing module 302 includes:
Determination sub-module 3021, for according to it is described first apply, it is described second application application attribute and it is default when
The interior number of starts determines the peep-proof priority of first application and second application;
Third handles submodule 3022, for according to the peep-proof priority, first application and described second to be answered
Use the peep-proof display parameters of the application of middle peep-proof highest priority as target peep-proof display parameters.
Optionally, the determining module is further used for detecting that the operation of user is preset peep-proof mode startup operation
Or when occurring preset peep-proof pattern startup word in present displayed content, triggering peep-proof instruction.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display
Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
Mobile terminal 300 can realize each process that mobile terminal is realized in the embodiment of the method for Fig. 1 and Fig. 2, to keep away
Exempt to repeat, which is not described herein again.Mobile terminal 300 will answer user demand to start after determining the peep-proof instruction of user's triggering
Peep-proof pattern corresponds in foreground application and background application the last application two being activated and answers by obtaining in the peep-proof pattern
Target peep-proof display parameters, to adjust the display interface of the two applications, since the target peep-proof display parameters are characterizations
Therefore display parameters after the interface overlapping of the two applications can realize the mould of mobile terminal screen display interface after the adjustment
Pasting effect has carried out peep-proof protection to the individual privacy of user, just without sticking on peep-proof film in screen, and then avoids electricity
Acceleration consumption.
Fourth embodiment
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 600 shown in fig. 6 includes:At least
One processor 601, memory 602, at least one network interface 604 and user interface 603.It is each in mobile terminal 600
Component is coupled by bus system 605.It is understood that bus system 605 is logical for realizing the connection between these components
Letter.Bus system 605 further includes power bus, controlling bus and status signal bus in addition in addition to including data/address bus.But it is
For the sake of clear explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Both or may include volatile and non-volatile memory.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static RAM
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The memory 602 of system and method described herein be intended to including but not limited to these and it is arbitrary its
It is suitble to the memory of type.
In some embodiments, memory 602 stores following element, executable modules or data structures, or
Their subset of person or their superset:Operating system 6021 and application program 6022.
Wherein, operating system 6021, including various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 6022, including various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 6022.
In embodiments of the present invention, by the program for calling memory 602 to store or instruction, specifically, can be application
The program stored in program 6022 or instruction, processor 601 are used for:Determine the peep-proof instruction of triggering;It is instructed according to the peep-proof,
Start peep-proof pattern, and obtains the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Its
In, first application is foreground application, and second application is the last application being activated, the mesh in background application
Mark peep-proof display parameters are used for characterizing the display parameters after the interface overlapping of first application and second application;According to institute
State target peep-proof display parameters, the display interface of adjustment first application and second application.
The method that the embodiments of the present invention disclose can be applied in processor 601, or be realized by processor 601.
Processor 601 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing
Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 602, processor 601 reads the information in memory 602, the above method is completed in conjunction with its hardware.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its
It combines to realize.For hardware realization, processing unit may be implemented in one or more application-specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
Optionally, processor 601 is additionally operable to:Obtain corresponded in the pre-set peep-proof pattern it is described first application and
The input range of second application;According to the input range, the touch screen of mobile terminal is divided into and institute by described
It states the first corresponding first area of application and applies corresponding second area with described second;Detect touching on the touch screen
Operation, and the target area occurred according to the touch operation are touched, determines intended application corresponding with the target area, it is described
Target area includes first area and second area;Corresponding input instruction is generated according to the touch operation, and will be described defeated
Enter instruction and be sent to the intended application to be handled.
Optionally, processor 601 is additionally operable to:If the touch operation is clicking operation, obtains the clicking operation and occur
Target area, determine corresponding with target area intended application;If the touch operation is slide, described in acquisition
Target area where the starting point of slide determines intended application corresponding with the target area.
Optionally, as another embodiment, processor 601 is additionally operable to:It is applied according to described first, second application
Application attribute and preset time in the number of starts, determine it is described first application and it is described second application peep-proof it is preferential
Grade;According to the peep-proof priority, the application of peep-proof highest priority is anti-during first application and described second are applied
Display parameters are peeped as target peep-proof display parameters.
Optionally, processor 601 is additionally operable to:Detect that the operation of user is preset peep-proof mode startup operation or works as
When occurring preset peep-proof pattern startup word in preceding display content, triggering peep-proof instruction.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display
Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
Mobile terminal 600 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
It repeats no more.Mobile terminal 600 will answer user demand to start peep-proof pattern, by obtaining after determining the peep-proof instruction of triggering
Take the target peep-proof for corresponding to the last application of application two being activated in foreground application and background application in the peep-proof pattern aobvious
Show parameter, to adjust the display interface of the two applications, since the target peep-proof display parameters are the boundaries for characterizing the two applications
Therefore display parameters after the overlapping of face can realize the blurring effect of mobile terminal screen display interface, to user after the adjustment
Individual privacy carried out peep-proof protection, just without in screen sticking on peep-proof film, and then avoid the acceleration consumption of electricity.
5th embodiment
Fig. 7 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7
700 can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric
Brain etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (Radio Frequency, RF) circuit 710, memory 720, input
Unit 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (Wireless Fidelity) modules 780 and electricity
Source 790.
Wherein, input unit 730 can be used for receiving number input by user or character information, and generation and mobile terminal
The 700 related signal input of user setting and function control.Specifically, in the embodiment of the present invention, which can
To include touch panel 731.Touch panel 731, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses the operations of any suitable object or attachment on touch panel 731 such as finger, stylus), and according to advance
The formula of setting drives corresponding attachment device.Optionally, touch panel 731 may include touch detecting apparatus and touch controller
Two parts.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, by signal
Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate,
The processor 760 is given again, and can be received order that processor 760 is sent and be executed.Furthermore, it is possible to using resistance-type,
The multiple types such as condenser type, infrared ray and surface acoustic wave realize touch panel 731.In addition to touch panel 731, input unit
730 can also include other input equipments 732, other input equipments 732 can include but is not limited to physical keyboard, function key
It is one or more in (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc..
Wherein, display unit 740 can be used for showing information input by user or be supplied to information and the movement of user
The various menu interfaces of terminal 700.Display unit 740 may include display panel 741, optionally, LCD or organic hairs may be used
The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 741.
It should be noted that touch panel 731 can cover display panel 741, touch display screen is formed, when the touch display screen is examined
It measures and sends processor 760 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device
760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
Including the interface elements such as icon and/or widget desktop controls of at least one application program.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or executing the software program and/or module that are stored in first memory 721, and calling storage
Data in second memory 722 execute the various functions and processing data of mobile terminal 700, to mobile terminal 700
Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by calling store the first memory 721 in software program and/or module and/
Or the data in the second memory 722, peep-proof instruction of the processor 760 for determining triggering;It is instructed, is opened according to the peep-proof
Dynamic peep-proof pattern, and obtain the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Wherein,
First application is foreground application, and second application is the last application being activated, the target in background application
Peep-proof display parameters are used for characterizing the display parameters after the interface overlapping of first application and second application;According to described
Target peep-proof display parameters, the display interface of adjustment first application and second application.
Optionally, processor 760 corresponds to first application and institute for obtaining in the pre-set peep-proof pattern
State the input range arrange parameter of the second application;According to the input range, the touch screen of the mobile terminal is divided into
And described first applies corresponding second area using corresponding first area and with described second;It detects on the touch screen
Touch operation, and the target area occurred according to the touch operation determines corresponding with target area intended application,
The target area includes first area and second area;Corresponding input is generated according to the touch operation to instruct, and by institute
Input instruction is stated to be sent to the intended application and handled.
Optionally, if it is clicking operation that processor 760, which is used for the touch operation, the mesh that the clicking operation occurs is obtained
Region is marked, determines intended application corresponding with the target area;If the touch operation is slide, the sliding is obtained
Target area where the starting point of operation determines intended application corresponding with the target area.
Optionally, processor 760 be used for according to it is described first apply, it is described second application application attribute and it is default when
The interior number of starts determines the peep-proof priority of first application and second application;According to the peep-proof priority,
Using the peep-proof display parameters of the application of peep-proof highest priority in first application and second application as target peep-proof
Display parameters.
Optionally, processor 760 is used to detect that the operation of user to be preset peep-proof mode startup operation or current
When occurring preset peep-proof pattern startup word in display content, triggering peep-proof instruction.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display
Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
As it can be seen that mobile terminal 700 will answer user demand to start peep-proof pattern after determining the peep-proof instruction of triggering, lead to
It crosses and obtains that correspond in foreground application and background application the target that the last application two being activated is applied in the peep-proof pattern anti-
Display parameters are peeped, to adjust the display interface of the two applications, since the target peep-proof display parameters are the two applications of characterization
Interface overlapping after display parameters therefore can realize the blurring effect of mobile terminal screen display interface after the adjustment, it is right
The individual privacy of user has carried out peep-proof protection, just without sticking on peep-proof film in screen, and then avoids the acceleration consumption of electricity.
Sixth embodiment
The embodiments of the present invention also provide a kind of computer readable storage mediums, are stored thereon with computer program, should
Following steps are realized when program is executed by processor:Determine the peep-proof instruction of triggering;It is instructed according to the peep-proof, starts peep-proof mould
Formula, and obtain the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Wherein, described first
It is shown using for the last application being activated, the target peep-proof in background application using for foreground application, described second
Parameter is used for characterizing the display parameters after the interface overlapping of first application and second application;According to the target peep-proof
Display parameters, the display interface of adjustment first application and second application.
Optionally, following steps can also be realized when which is executed by processor:Obtain the pre-set peep-proof
The input range of first application and second application is corresponded in pattern;It, will be described mobile whole according to the input range
The touch screen at end is divided into and described first applies corresponding second area using corresponding first area and with described second;
The touch operation on the touch screen, and the target area occurred according to the touch operation are detected, is determined and the target
The corresponding intended application in region, the target area include first area and second area;According to touch operation generation pair
The input instruction answered, and input instruction is sent to the intended application and is handled.
Optionally, following steps can also be realized when which is executed by processor:If the touch operation is to click to grasp
Make, obtain the target area that the clicking operation occurs, determines intended application corresponding with the target area;If the touch
Operation is slide, obtains the target area where the starting point of the slide, and determination is corresponding with the target area
Intended application.
Optionally, following steps can also be realized when which is executed by processor:Applied according to described first, described the
The number of starts in the application attribute and preset time of two applications determines the peep-proof of first application and second application
Priority;According to the peep-proof priority, by the application of peep-proof highest priority in first application and second application
Peep-proof display parameters as target peep-proof display parameters.
Optionally, following steps can also be realized when which is executed by processor:Detect that the operation of user is default
Peep-proof mode startup operation or present displayed content in when there is preset peep-proof pattern and starting word, triggering peep-proof refers to
It enables.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display
Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus
Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
It connects, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can to store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Explanation is needed further exist for, this mobile terminal described in this description includes but not limited to smart mobile phone, puts down
Plate computer etc..
This many functional component described in this description is all referred to as module, specifically to emphasize its realization side
The independence of formula.
In the embodiment of the present invention, module can use software realization, to be executed by various types of processors.Citing comes
It says, the executable code module of a mark may include the one or more physics or logical block of computer instruction, citing
For, object, process or function can be built as.Nevertheless, the executable code of institute's mark module is without physically
It is located together, but may include the different instructions being stored in different positions, be combined together when in these command logics
When, it constitutes module and realizes the regulation purpose of the module.
In fact, executable code module can be the either many item instructions of individual instructions, and can even be distributed
It on multiple and different code segments, is distributed in distinct program, and is distributed across multiple memory devices.Similarly, it grasps
Making data can be identified in module, and can be realized according to any form appropriate and be organized in any appropriate class
In the data structure of type.The operation data can be collected as individual data collection, or can be distributed on different location
(including in different storage device), and can only be present in system or network as electronic signal at least partly.
When module can utilize software realization, it is contemplated that the level of existing hardware technique, it is possible to implemented in software
Module, in the case where not considering cost, those skilled in the art can build corresponding hardware circuit to realize correspondence
Function, the hardware circuit includes conventional ultra-large integrated (VLSI) circuit or gate array and such as logic core
The existing semiconductor of piece, transistor etc either other discrete elements.Module can also use programmable hardware device, such as
The realizations such as field programmable gate array, programmable logic array, programmable logic device.
Above-mentioned exemplary embodiment is described with reference to those attached drawings, many different forms and embodiment be it is feasible and
Without departing from spirit of that invention and teaching, therefore, the present invention should not be construed as in the limitation of this proposed exemplary embodiment.
More precisely, these exemplary embodiments are provided so that the present invention can be perfect and complete, and can be by the scope of the invention
It is communicated to those those of skill in the art.In those schemas, size of components and relative size be perhaps based on it is clear for the sake of
And it is exaggerated.Term used herein is based only on description particular example embodiment purpose, and being not intended to, which becomes limitation, uses.Such as
Ground is used at this, unless the interior text clearly refers else, otherwise the singulative " one ", "one" and "the" be intended to by
Those multiple forms are also included in.Those term "comprising"s and/or " comprising " will become further apparent when being used in this specification,
It indicates the presence of the feature, integer, step, operation, component and/or component, but is not excluded for one or more other features, whole
Number, step, operation, component, component and/or the presence of its group or increase.Unless otherwise indicated, narrative tense, a value range packet
Bound containing the range and any subrange therebetween.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, without departing from the principles of the present invention, it can also make several improvements and retouch, these improvements and modifications
It should be regarded as protection scope of the present invention.